General

  • Target

    JaffaCakes118_fe3a707a4e3bdc31baf1094855532608

  • Size

    34KB

  • Sample

    250111-l5zn7syldm

  • MD5

    fe3a707a4e3bdc31baf1094855532608

  • SHA1

    98a72827fb131b19057a30b28a7e0b4de15bdd7c

  • SHA256

    209964fe328802e1b57a676e9560ebcdfb46c6e04d45ba3200fb210d251ae7e0

  • SHA512

    241375c297752c805b68dde7b1f5a1e380acdaaa3930b81a86d2fc367c6396eafa7631a167ad0e802009e3e98081e52b5e28999558ac599ac37bbbd7f0ac3e2b

  • SSDEEP

    768:kqp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:kqpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_fe3a707a4e3bdc31baf1094855532608

    • Size

      34KB

    • MD5

      fe3a707a4e3bdc31baf1094855532608

    • SHA1

      98a72827fb131b19057a30b28a7e0b4de15bdd7c

    • SHA256

      209964fe328802e1b57a676e9560ebcdfb46c6e04d45ba3200fb210d251ae7e0

    • SHA512

      241375c297752c805b68dde7b1f5a1e380acdaaa3930b81a86d2fc367c6396eafa7631a167ad0e802009e3e98081e52b5e28999558ac599ac37bbbd7f0ac3e2b

    • SSDEEP

      768:kqp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:kqpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks